[GLSA-202307-01] OpenSSH: Remote Code Execution
Multiple vulnerbilities have been discovered in OpenSSH, the worst of which could result in remote code execution.
Background
OpenSSH is a free application suite consisting of server and clients that replace tools like telnet, rlogin, rcp and ftp with more secure versions offering additional functionality.
Description
Multiple vulnerabilities have been discovered in OpenSSH. Please review the CVE identifiers referenced below for details.
Impact
Please review the CVE identifiers referenced below for details.
Workaround
CVE-2023-38408 can be worked around by avoiding connecting to untrusted servers with an SSH agent.
Resolution
All OpenSSH users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/openssh-9.3_p2"
Package | Affected Version |
---|---|
pkg:ebuild/net-misc/openssh?distro=gentoo | < 9.3_p2 |
Package | Unaffected Version |
---|---|
pkg:ebuild/net-misc/openssh?distro=gentoo | >= 9.3_p2 |
- ID
- GLSA-202307-01
- Severity
- high
- URL
- https://security.gentoo.org/glsa/202307-01
- Published
-
2023-07-20T00:00:00
(14 months ago) - Modified
-
2023-07-20T00:00:00
(14 months ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2023-1802
- ALAS2-2023-2176
- ALPINE:CVE-2023-28531
- ALPINE:CVE-2023-38408
- ALSA-2023:2645
- ALSA-2023:4412
- ALSA-2023:4419
- ELSA-2023-12711
- ELSA-2023-2645
- ELSA-2023-4382
- ELSA-2023-4412
- ELSA-2023-4419
- ELSA-2023-4428
- FEDORA-2023-1176c8b10c
- FEDORA-2023-123647648e
- FEDORA-2023-79a18e1725
- FEDORA-2023-878e04f4ae
- FEDORA-2024-2aac54ebb7
- FREEBSD:09B7CD39-47BD-11EE-8E38-002590C1F29C
- FREEBSD:291D0953-47C1-11EE-8E38-002590C1F29C
- FREEBSD:887EB570-27D3-11EE-ADBA-C80AA9043978
- FREEBSD:E31A8F8E-47BF-11EE-8E38-002590C1F29C
- RHSA-2023:2645
- RHSA-2023:4382
- RHSA-2023:4412
- RHSA-2023:4419
- RLSA-2023:4419
- SSA:2023-200-02
- SUSE-SU-2023:2940-1
- SUSE-SU-2023:2945-1
- SUSE-SU-2023:2946-1
- SUSE-SU-2023:2947-1
- SUSE-SU-2023:2950-1
- USN-6242-1
- USN-6242-2
- USN-6560-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2023-25136 | CVE-2023-25136 | https://nvd.nist.gov/vuln/detail/CVE-2023-25136 |
CVE | CVE-2023-28531 | CVE-2023-28531 | https://nvd.nist.gov/vuln/detail/CVE-2023-28531 |
CVE | CVE-2023-38408 | CVE-2023-38408 | https://nvd.nist.gov/vuln/detail/CVE-2023-38408 |
Bugzilla | 892936 | Bugzilla #892936 | https://bugs.gentoo.org/show_bug.cgi?id=892936 |
Bugzilla | 905299 | Bugzilla #905299 | https://bugs.gentoo.org/show_bug.cgi?id=905299 |
Bugzilla | 910553 | Bugzilla #910553 | https://bugs.gentoo.org/show_bug.cgi?id=910553 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |